Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of proposed framework, a pilot study by using a structured questionnaire was conducted. Framework using multilevel to enhance management information system on sensitive data in cloud environment.
The purpose of this research is to test the ability of the true strength index To time and manage trading in the financial market to select the best stocks and achieve a higher return than the Simple buy and hold strategy. And To achieve the objectives of the research, it relied on the main hypothesis, which is By using the True Strength Index to manage trading decisions buying and selling, can be achieved higher returns than the buy and hold strategy . The research community has been identified with all stocks listed on the Iraq Stock Exchange. Implementing the financial research tests requires selecting a sample from the research community that fulfills the test requirements according to a number of conditions So (38) companies we
... Show MoreThe operation and management of water resources projects have direct and significant effects on the optimum use of water. Artificial intelligence techniques are a new tool used to help in making optimized decisions, based on knowledge bases in the planning, implementation, operation and management of projects as well as controlling flowing water quantities to prevent flooding and storage of excess water and use it during drought.
In this research, an Expert System was designed for operating and managing the system of AthTharthar Lake (ESSTAR). It was applied for all expected conditions of flow, including the cases of drought, normal flow, and during floods. Moreover, the cases of hypothetical op
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreThe aim of the research is to demonstrate the impact of organizational diversity management on achieving success, The problem of research is to create an appropriate work environment that stimulates everyone regardless of each dimension of diversity, So as to reach the best levels of success, The importance of research is to identify how the organization in question can manage organizational diversity effectively and contribute to its success, The research started from two main hypotheses which were derived from sub-hypotheses to identify the correlation and influence between the search variables by analyzing the answers of the research sample which included (81)
... Show MoreThe aim of the research is to shed light on identifying the extent of the university professor's competencies and their roles in managing and training participants in e-training workshops as a pedagogical point view. The research sample consisted of a group of (30) university professors (lecturers) in the training workshops, in scientific,humanitarian and social disciplines, including (12) a university professor (holding a trainer certificate), , the research methodology is descriptive, and the community is a group of trained participants. (115) participated in (40) e-training workshops organized by the Center for Continuing Education at the University of Baghdad (and the selection of workshops within the researcher's specialization in the
... Show MoreAbstract:
Research Topic: Ruling on the sale of big data
Its objectives: a statement of what it is, importance, source and governance.
The methodology of the curriculum is inductive, comparative and critical
One of the most important results: it is not permissible to attack it and it is a valuable money, and it is permissible to sell big data as long as it does not contain data to users who are not satisfied with selling it
Recommendation: Follow-up of studies dealing with the provisions of the issue
Subject Terms
Judgment, Sale, Data, Mega, Sayings, Jurists